Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory

Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory
Author: Patrick Sole
Publisher: World Scientific
Total Pages: 215
Release: 2022-04-11
Genre: Computers
ISBN: 9811248346

Download Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory Book in PDF, Epub and Kindle

Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users.This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they triggered, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.

Asymptotic Combinatorial Coding Theory

Asymptotic Combinatorial Coding Theory
Author: Volodia Blinovsky
Publisher: Springer Science & Business Media
Total Pages: 128
Release: 1997-08-31
Genre: Technology & Engineering
ISBN: 9780792399889

Download Asymptotic Combinatorial Coding Theory Book in PDF, Epub and Kindle

Asymptotic Combinatorial Coding Theory is devoted to the investigation of the combinatorial properties of transmission systems using discrete signals. The book presents results of interest to specialists in combinatorics seeking to apply combinatorial methods to problems of combinatorial coding theory. Asymptotic Combinatorial Coding Theory serves as an excellent reference for resarchers in discrete mathematics, combinatorics, and combinatorial coding theory, and may be used as a text for advanced courses on the subject.

On Foundations of Public-key Encryption and Secret Sharing

On Foundations of Public-key Encryption and Secret Sharing
Author: Akshay Dhananjai Degwekar
Publisher:
Total Pages: 166
Release: 2019
Genre:
ISBN:

Download On Foundations of Public-key Encryption and Secret Sharing Book in PDF, Epub and Kindle

Since the inception of Cryptography, Information theory and Coding theory have influenced cryptography in myriad ways including numerous information-theoretic notions of security in secret sharing, multiparty computation and statistical zero knowledge; and by providing a large toolbox used extensively in cryptography. This thesis addresses two questions in this realm: Leakage Resilience of Secret Sharing Schemes. We show that classical secret sharing schemes like Shamir secret sharing and additive secret sharing over prime order fields are leakage resilient. Leakage resilience of secret sharing schemes is closely related to locally repairable codes and our results can be viewed as impossibility results for local recovery over prime order fields. As an application of the result, we show the leakage resilience of a variant of the Goldreich-Micali-Wigderson protocol. From Laconic Statistical Zero Knowledge Proofs to Public Key Encryption. Languages with statistical zero knowledge proofs that are also average-case hard have been used to construct various cryptographic primitives. We show that hard languages with laconic SZK proofs, that is proof systems where the communication from the prover to the verifier is small, imply public key encryption.

An Introduction to Secret Sharing

An Introduction to Secret Sharing
Author: Stephan Krenn
Publisher: Springer Nature
Total Pages: 81
Release: 2023-05-25
Genre: Computers
ISBN: 3031281616

Download An Introduction to Secret Sharing Book in PDF, Epub and Kindle

This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.

Combinatorial Designs

Combinatorial Designs
Author: Christos Koukouvinos
Publisher:
Total Pages: 500
Release: 2014-09-15
Genre: Mathematics
ISBN: 9783110294088

Download Combinatorial Designs Book in PDF, Epub and Kindle

Cryptography and Coding

Cryptography and Coding
Author: Maura B. Paterson
Publisher: Springer Nature
Total Pages: 323
Release: 2021-12-14
Genre: Computers
ISBN: 3030926419

Download Cryptography and Coding Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the 18th IMA International Conference on Cryptography and Coding, IMACC 2021, held in December 2021. Due to COVID 19 pandemic the conference was held virtually. The 14 papers presented were carefully reviewed and selected from 30 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

Coding, Cryptography, and Combinatorics

Coding, Cryptography, and Combinatorics
Author: Keqin Feng
Publisher: Birkhauser
Total Pages: 405
Release: 2004
Genre: Computers
ISBN: 9780817624293

Download Coding, Cryptography, and Combinatorics Book in PDF, Epub and Kindle

This book contains a selection of papers submitted to the Workshop on Coding, Cryptography and Combinatorics (CCC 2003). An important feature of the book are invited surveys on key topics such as Boolean functions in cryptology, correlation attacks on LFSR sequences, decoding algorithms for linear codes, LDPC codes, and towers of function fields. There are also carefully selected contributed papers on many aspects of coding theory, cryptology and combinatorics, for instance, new constructions of codes, decoding algorithms, coding bounds, digital nets, cryptanalysis of cryptosystems and other cryptographic schemes, linear complexity o sequences, cross-correlation of sequences, authentication codes, fast arithmetic for cryptosystems, capacity regions, and combinatorial tableaux. The reader will be informed about current reesearch in these very active areas. The book is of interest for postgraduate students and researchers in mathematics, computer science, information theory and electrical engineering.

Codes, Designs, Cryptography and Optimization

Codes, Designs, Cryptography and Optimization
Author: Raúl M Falcón
Publisher: Mdpi AG
Total Pages: 0
Release: 2022-07
Genre:
ISBN: 9783036543550

Download Codes, Designs, Cryptography and Optimization Book in PDF, Epub and Kindle

Novel synergies are continuously being developed among the research areas in coding theory, cryptography, combinatorial design, and combinatorial optimization. They give rise to new applications to other fields and to the real world, including algebraic geometry, artificial intelligence, communication networks, computer science, hardware and software design, design of experiments, logistics, machine learning, and scheduling or transportation networks, among others. With contributions of researchers of six different universities from five countries, this book consists of a compilation of some relevant and recent investigations concerning this area. It covers a vast range of topics, such as Hadamard matrices, quasigroups, Latin squares, secret sharing schemes, binary linear codes, hierarchical posets, computational algebra systems, lightweight cryptography, low-end embedded processors, block ciphers, and text compression.

Secret Sharing and Network Coding

Secret Sharing and Network Coding
Author: Fiona May Knoll
Publisher:
Total Pages:
Release: 2013
Genre:
ISBN:

Download Secret Sharing and Network Coding Book in PDF, Epub and Kindle

Abstract: In this thesis, we consider secret sharing schemes and network coding. Both of these fields are vital in today's age as secret sharing schemes are currently being implemented by government agencies and private companies, and as network coding is continuously being used for IP networks. We begin with a brief overview of linear codes. Next, we examine van Dijk's approach to realize an access structure using a linear secret sharing scheme; then we focus on a much simpler approach by Tang, Gao, and Chen. We show how this method can be used to find an optimal linear secret sharing scheme for an access structure with six participants. In the last chapter, we examine network coding and point out some similarities between secret sharing schemes and network coding. We present results from a paper by Silva and Kschischang; in particular, we present the concept of universal security and their coset coding scheme to achieve universal security.